Goldman Sachs 2015 Annual Report Download - page 46

Download and view the complete annual report

Please find page 46 of the 2015 Goldman Sachs annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 236

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236

THE GOLDMAN SACHS GROUP, INC. AND SUBSIDIARIES
Although we take protective measures and endeavor to
modify them as circumstances warrant, our computer
systems, software and networks may be vulnerable to
unauthorized access, misuse, computer viruses or other
malicious code and other events that could have a security
impact. If one or more of such events occur, this potentially
could jeopardize our or our clients’ or counterparties’
confidential and other information processed and stored in,
and transmitted through, our computer systems and
networks, or otherwise cause interruptions or malfunctions
in our, our clients’, our counterparties’ or third parties’
operations, which could impact their ability to transact
with us or otherwise result in significant losses or
reputational damage.
The increased use of mobile and cloud technologies can
heighten these and other operational risks. We expect to
expend significant additional resources on an ongoing basis
to modify our protective measures and to investigate and
remediate vulnerabilities or other exposures, but these
measures may be ineffective and we may be subject to
litigation and financial losses that are either not insured
against or not fully covered through any insurance
maintained by us. Certain aspects of the security of such
technologies are unpredictable or beyond our control, and
the failure by mobile technology and cloud service
providers to adequately safeguard their systems and prevent
cyber attacks could disrupt our operations and result in
misappropriation, corruption or loss of confidential and
other information. In addition, there is a risk that
encryption and other protective measures, despite their
sophistication, may be defeated, particularly to the extent
that new computing technologies vastly increase the speed
and computing power available.
We routinely transmit and receive personal, confidential
and proprietary information by email and other electronic
means. We have discussed and worked with clients,
vendors, service providers, counterparties and other third
parties to develop secure transmission capabilities and
protect against cyber attacks, but we do not have, and may
be unable to put in place, secure capabilities with all of our
clients, vendors, service providers, counterparties and other
third parties and we may not be able to ensure that these
third parties have appropriate controls in place to protect
the confidentiality of the information. An interception,
misuse or mishandling of personal, confidential or
proprietary information being sent to or received from a
client, vendor, service provider, counterparty or other third
party could result in legal liability, regulatory action and
reputational harm.
Group Inc. is a holding company and is dependent for
liquidity on payments from its subsidiaries, many of
which are subject to restrictions.
Group Inc. is a holding company and, therefore, depends
on dividends, distributions and other payments from its
subsidiaries to fund dividend payments and to fund all
payments on its obligations, including debt obligations.
Many of our subsidiaries, including our broker-dealer and
bank subsidiaries, are subject to laws that restrict dividend
payments or authorize regulatory bodies to block or reduce
the flow of funds from those subsidiaries to Group Inc.
In addition, our broker-dealer and bank subsidiaries are
subject to restrictions on their ability to lend or transact
with affiliates and to minimum regulatory capital and other
requirements, as well as restrictions on their ability to use
funds deposited with them in brokerage or bank accounts
to fund their businesses. Additional restrictions on related-
party transactions, increased capital and liquidity
requirements and additional limitations on the use of funds
on deposit in bank or brokerage accounts, as well as lower
earnings, can reduce the amount of funds available to meet
the obligations of Group Inc., including under the Federal
Reserve Board’s source of strength policy, and even require
Group Inc. to provide additional funding to such
subsidiaries. Restrictions or regulatory action of that kind
could impede access to funds that Group Inc. needs to make
payments on its obligations, including debt obligations, or
dividend payments. In addition, Group Inc.’s right to
participate in a distribution of assets upon a subsidiary’s
liquidation or reorganization is subject to the prior claims
of the subsidiary’s creditors.
34 Goldman Sachs 2015 Form 10-K